- Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao 0005, Zung Le. Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Cryptography, 8(1):5, March 2024.
- Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu. Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography. Cryptography, 8(1):11, March 2024.
- Ravikumar Selvam, Akhilesh Tyagi. Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks. Cryptography, 8(1):1, March 2024.
- Devanshi Upadhyaya, Maël Gay, Ilia Polian. Locking-Enabled Security Analysis of Cryptographic Circuits. Cryptography, 8(1):2, March 2024.
- Francesc Sebé, Sergi Simón. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval. Cryptography, 8(1):10, March 2024.
- Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang. Novel and Efficient Privacy-Preserving Continuous Authentication. Cryptography, 8(1):3, March 2024.
- Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. Cryptography, 8(1):6, March 2024.
- Ahmad Kabil, Heba Aslan, Marianne Azer. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. Cryptography, 8(1):4, March 2024.
- Kyriaki Tsantikidou, Nicolas Sklavos 0001. Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. Cryptography, 8(1):7, March 2024.
- Hakan Uzuner, Elif Bilge Kavun. NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V. Cryptography, 8(1):9, March 2024.